VehicleSec '25 Technical Sessions

Monday, August 11

8:00 am–9:00 am

Continental Breakfast

9:00 am–9:15 am

Opening Remarks and Best Paper Awards

General Chairs: Z. Berkay Celik, Purdue University, and Ning Zhang, Washington University in St. Louis

9:15 am–10:00 am

Keynote Presentation

Ten Years After the Jeep Hack: A Retrospective on Automotive Cybersecurity

Charlie Miller and Chris Valasek, Open RCE

A decade has passed since Miller and Valasek remotely hacked a Jeep to gain control over the computer systems of the vehicle, highlighting the vulnerabilities of connected cars and the potential dangers of cyberattacks on vehicles. This keynote will look back into how the vehicle compromise occurred and what has changed in the auto industry since this research was presented. It will also detail the trials and tribulations of the current automotive security ecosystem and finish off with a prediction of where Miller and Valasek see the industry going in the future, given the changing threat landscapes of the automotive world. You probably want to wear shoes, because this keynote is about to blow your socks off.

Chris Valasek is a computer security researcher. He rose to fame by reverse engineering the Windows heap as well as running the world’s oldest computer security conference SummerCon. He is perhaps best known for automotive security research where he demonstrated remote vulnerabilities in a Jeep Cherokee that led to a recall of 1.5 million vehicles. He is currently the Director of Cybersecurity at Cruise, a self-driving car company.

Charlie Miller is perhaps best known as being Chris Valasek’s friend.

10:00 am–10:30 am

Coffee and Tea Break

10:30 am–11:20 am

Vehicle Network Security

Stateful Behavior Inference and Runtime Enforcement for Vehicle Network Security

Achintya Desai, UC Santa Barbara; Ruochen Dai, University of Florida; Yanju Chen, UC Santa Barbara; Ky Ho, Oceanit; Austin Kee, University of Florida; Sophie Bulatovic, Oceanit; Md Shafiuzzaman, UC Santa Barbara; Ken (Yihang) Bai, University of Florida; Il Ung Jeong and David Siu, Oceanit; Tuba Yavuz, University of Florida; Tevfik Bultan, UC Santa Barbara

CANdid - An Open-Access Annotated Dataset of Vehicle CAN Bus Traffic

Tomas Howson, CSSM, School of Physics, Chemistry and Earth Sciences, University of Adelaide; Alexander Rohl, Defence Science and Technology Group, Australia; Matthew Roughan, School of Computer and Mathematical Sciences, University of Adelaide; Martin White and James Zanotti, CSSM, School of Physics, Chemistry and Earth Sciences, University of Adelaide

11:20 am–12:00 pm

Drone Security

ConfuSense: Sensor Reconfiguration Attacks for Stealthy UAV Manipulation

Alessandro Erba, KASTEL Security Research Labs, Karlsruhe Institute of Technology; John H. Castellanos, Hitachi Energy Research, Germany; Sahil Sihag, CISPA Helmholtz Center for Information Security; Saman Zonouz, Georgia Institute of Technology; Nils Ole Tippenhauer, CISPA Helmholtz Center for Information Security

12:00 pm–1:30 pm

Symposium Luncheon

1:30 pm–2:00 pm

Electric Vehicle Charging Security 1

2:00 pm–2:45 pm

Autonomous Vehicle Privacy

2:45 pm–3:15 pm

Coffee and Tea Break

3:15 pm–4:10 pm

Hardware Security

4:10 pm–4:20 pm

Short Break

4:20 pm–5:20 pm

Tutorial

Session Chair: Mert Pesé, Clemson University

Hands-On Exploration of J1939 and NMEA 2000 Networks and Their Security Flaws

Jeremy Daily and Rik Chatterjee, Colorado State University

This tutorial provides a hands-on introduction to SAE J1939 and NMEA 2000 communication standards, foundational to networking in commercial vehicles and marine platforms. Participants will explore protocol architecture, including frame formats, addressing, arbitration, and multi-packet transport, through guided decoding exercises using real network traces. The session then shifts to protocol-level vulnerabilities rooted in design flaws—such as spoofing, denial-of-service, and control flow disruption—with live demonstrations on a virtual platform. Attendees will gain practical experience using open-source tools to assess vulnerabilities and inform safer protocol implementation.

6:00 pm–7:30 pm

VehicleSec '25 Demo/Poster Session and Happy Hour

Tuesday, August 12

8:00 am–8:50 am

Continental Breakfast

8:50 am–9:00 am

Opening Remarks and Demo Awards

General Chairs: Z. Berkay Celik, Purdue University, and Ning Zhang, Washington University in St. Louis

9:00 am–10:00 am

Keynote Presentation

What Vehicle Security Can Learn from Medical Device Security

Kevin Fu, Northeastern University

Vehicles, medical devices, and other cyber-physical systems increasingly rely on sensors to make safety-critical decisions in real time. In my lab, we study how attackers can exploit the physics of sensors and analog interfaces to manipulate computation at the most fundamental level. But this talk isn’t about that research.

Instead, I’ll focus on lessons from nearly two decades of medical device security research, and this can teach us about securing the next generation of vehicles. Medical devices, such as pacemakers and infusion pumps, share surprising similarities with modern automotive systems. Both involve long product lifecycles, real-time embedded software, RF communication, complex supply chains, and safety. Both also operate in regulatory environments that often struggle to keep pace with technical innovation. However, only medical device security is written into U.S. statute (i.e., law rather than just regulatory policy).

The medical device industry has faced repeated challenges such as coordinated vulnerability disclosures, government-mandated recalls, supply chain risk management, and pressure to align safety engineering with modern security practices. The FDA’s evolving regulatory framework, along with increasing transparency around postmarket cybersecurity, offers valuable lessons in how to build trust and resilience into safety-critical systems.

This talk will examine how the healthcare sector approaches threat modeling, security engineering, postmarket risk management, and incident response, including both successes and missteps. It will also explore how regulators, researchers, and industry engineers collaborated, often in error but never in doubt, to improve security outcomes in deployed systems. My aim is to share practical insights for those designing or securing automotive platforms so we can avoid repeating the same mistakes and accelerate the maturity of vehicle cybersecurity before the industry finds itself in crisis.

Professor Kevin Fu is a global leader at the intersection of healthcare, cybersecurity, electronics, and medical device innovation. He is a Professor at Northeastern University in Boston with joint appointments in Electrical & Computer Engineering, the Khoury College of Computer Sciences, and Bioengineering. He also serves as Director of the Archimedes Center for Healthcare and Medical Device Cybersecurity.

Professor Fu’s research vision is a world where science-based security is built in by design to all embedded systems, including medical devices, health care delivery, autonomous transportation, manufacturing, and the Internet of Things. His research lab focuses on analog cybersecurity, understanding and defending against threats to the physics of computation and sensing.

He has delivered over 100 invited talks to audiences worldwide on topics such as medical device security, embedded systems, and the physics of cybersecurity. Since his pioneering research on pacemaker and defibrillator vulnerabilities more than 17 years ago, he has helped shape the field of medical device cybersecurity. He advises medical device manufacturers, pharmaceutical companies, and startups on secure system design to seek FDA clearance or approval---and how to avoid FDA recalls for cybersecurity deficiencies.

Professor Fu previously served as the first Acting Director of Medical Device Security at U.S. Food and Drug Administration. He has advised the White House, Congress, NIST, and private-sector leaders on strengthening cybersecurity for critical infrastructure and healthcare technologies. He also leads national efforts in developing interdisciplinary medical device cybersecurity curricula in partnership with academic, clinical, and industry stakeholders.

Professor Fu was recognized as an ACM Fellow, IEEE Fellow, AAAS Fellow, and Sloan Research Fellow, and NSF CAREER Award recipient. He received the MIT Technology Review TR35 Innovator of the Year, Fed100 Award, and the IEEE Security and Privacy Test of Time Award, and earned best paper awards from USENIX Security, IEEE S&P, and ACM SIGCOMM. He chairs the USENIX Security Test of Time Awards Selection Committee. Prof. Fu received his BS, MEng, and PhD from MIT.

10:00 am–10:30 am

Coffee and Tea Break

10:30 am–10:45 am

Lightning Talks

Session Chair: Mert Pesé, Clemson University

  • On-Road Driver Identification Dataset with CyberAttack
    Jeremy Daily, Colorado State University
  • Securing the Future of Marine Data with NMEA OneNet
    Jeremy Daily, Colorado State University
  • TBA

10:45 am–11:15 am

Autonomous Vehicle Security

11:15 am–12:00 pm

Electric Vehicle Charging Security 2

Oblivious Plug&Charge: A Privacy-Preserving EV Charging Scheme based on ORAM

Timm Lauser, Darmstadt University of Applied Sciences; Nergiz Yuca, University of Passau; Dustin Kern, Darmstadt University of Applied Sciences; Nikolay Matyunin, Honda Research Institute Europe GmbH; Stefan Katzenbeisser, University of Passau; Christoph Krauß, Darmstadt University of Applied Sciences

12:00 pm–1:30 pm

Symposium Luncheon

1:30 pm–2:00 pm

Human Aspects of Vehicle Security and Privacy

2:00 pm–2:40 pm

Vehicle Security Analysis

2:40 pm–3:10 pm

Coffee and Tea Break

3:10 pm–4:10 pm

AI-Based Attacks and Defenses

4:10 pm–4:20 pm

Short Break

4:20 pm–5:20 pm

Tutorial

Session Chair: Mert Pesé, Clemson University

Crash, Fail-safe, or Recover: Securing Robotic Autonomous Vehicles

Pritam Dash and Karthik Pattabiraman, University of British Columbia

This tutorial explores how physical sensor attacks compromise the safety and control of Robotic Autonomous Vehicles (RAVs), with a focus on state estimation failures. It will present and compare attack recovery techniques for both traditional PID-based and deep reinforcement learning (Deep-RL) controlled RAVs, including software sensors, feed-forward control, and multi-objective adversarial training. Through a mix of lectures and hands-on virtual activities, participants will learn to analyze attacks and apply resilient control strategies across different RAV architectures.

5:20 pm–5:30 pm

Closing Remarks

General Chairs: Z. Berkay Celik, Purdue University, and Ning Zhang, Washington University in St. Louis